In many recent attacks, including the successful breach at the U.S. Office of Personnel Management (OPM), malicious hackers were inside almost a year before being discovered. Since the breach, many security professionals have been asking themselves, “What should I do? My environment is probably already breached, so how do I find and stop it?” Learn four immediate steps to detect malicious activity and strategies for prevention for a porous perimeter through incident response and threat intelligence. The talk will include specific data-centric security models, user behavior analytics, advanced threat detection and big data analytics.
(ISC)² Security Congress channel contains digital content of activities at (ISC)2's Flagship conference event. You'll find keynotes, sessions and related items.…